Welcome, Guest: Register On Nairaland / LOGIN! / Trending / Recent / NewStats: 3,194,168 members, 7,953,626 topics. Date: Thursday, 19 September 2024 at 09:07 PM |
Nairaland Forum / Science/Technology / Programming / Infosec Geek Speak Glossary (776 Views)
Glossary Tuesday #2: Contractual Terms / Glossary Thursday #1: Conditions And Warranties- The Difference / Where Is That Female Geek: Any Good Female Developer Around? (2) (3) (4)
(1) (Reply)
Infosec Geek Speak Glossary by iThoughtSec(m): 11:52am On Aug 30, 2015 |
Hey, this is something i stumble upon online, and thought one or two person may want to know this terms. @ — Symbol chosen by Ray Tomlinson, a Raytheon BBN Technologies engineer who sent the first Internet email, to separate the names of users and their networks in addresses. Advanced Persistent Threat(APT) — A group, such as a government or a criminal organization, with the expertise, resources and intent to target a specific entity. An APT uses multiple methods to break into a network, avoid detection and harvest valuable information over a long period of time. Air gap — To physically separate or isolate a secure network from other unsecured systems or networks. Back door — A hidden entry to a computer, network or software that bypasses security measures. Blackhat — A criminal hacker who breaches security for malicious reasons or personal gain. Blue Team — A group defending a computer system from mock attackers, usually as part of a controlled exercise. During the Raytheon National Collegiate Cyber Defense Competition the blue teams are made up of students. Bot — A program that automates a simple action. Bots infect computers and secretly perform activities under the control of a remote administrator. Botnet — A collection of computers infected by bots. Bot master or herder —Someone who controls a botnet. DoS Attack — A Denial-of-Service attack disrupts a website, server, or network resource – often by flooding it with more requests than it can handle. DDoS Attack — A Distributed Denial of Service Attack is a DoS attack using a multitude of machines. Hackers often control one “master” machine to orchestrate the actions of “zombie” machines. End-point Security — Security measures that protect a network from potential vulnerabilities posed by laptops and other mobile devices that access the network remotely. Fuzzing — Automated input of invalid, unexpected or random data to a computer program. “Shocking” a computer in this way can reveal vulnerabilities. Honeypot — A trap set to detect intruders. A honeypot usually simulates a real network but is actually isolated and monitored so it can give advance warning of an intrusion. Insider threat – A threat posed by employees, contractors, business associates or other people who have inside access to a computer system. Raytheon is the No. 1 insider threat solution provider, protecting hundreds of thousands of endpoints. Malware —Software designed to hijack, damage, destroy or steal information from a device or system. Variations include spyware, adware, rootkits, viruses, keyloggers, and more. Patching —The process of updating software. Pentest — Short for penetration testing, or trying to hack into a system to identify weaknesses. Phishing — Tricking someone into giving away personal information by imitating legitimate companies, organizations, or people online. The “ph” derives from phreaking, or “phone freaking” — hijacking telephone lines. Spearphishing focuses on a particular target. Pwned — Pronounced like owned with a “p” at the beginning, pwned means to defeat security measures. Derives from the word “own,” or dominate. Red Team — A group of cybersecurity professionals authorized to simulate an attack. A “blue team” of students will face a red team at the Raytheon National Collegiate Cyber Defense Competition. Social Engineering —Manipulating people into sharing private information. White Team — A group responsible for refereeing an engagement between a red team of mock attackers and a blue team of cyber defenders. Whitelist — The opposite of a blacklist, a whitelist is a list of people, groups or software OK’d for system access. Zombie — An infected device that is used to perform malicious tasks under remote control. Botnets of zombie computers are often used to spread e-mail spam and launch denial-of-service (DoS) attacks. Thanks for reading and remember … “You Own Your Own Security!” Reference: http://www.ithoughtsecurity.com/2015/08/infosec-geek-speak-glossary.html |
(1) (Reply)
Can You Get Get A Good Job Learning Computer Science / The Ground Warrior / Augmented Reality Clearly Explain
(Go Up)
Sections: politics (1) business autos (1) jobs (1) career education (1) romance computers phones travel sports fashion health religion celebs tv-movies music-radio literature webmasters programming techmarket Links: (1) (2) (3) (4) (5) (6) (7) (8) (9) (10) Nairaland - Copyright © 2005 - 2024 Oluwaseun Osewa. All rights reserved. See How To Advertise. 14 |